Hello and welcome to exampundit. Here is a set of New Pattern English Quiz for IBPS PO, RBI Grade B Exam.
Advertisement
(adsbygoogle = window.adsbygoogle || []).push({});
Directions (Qs. 1-5): In each question below, two sentences are
given. These two sentences are to be combined into a single sentence without
changing their meaning. Three probable starters of the so combined sentence are
given which are denoted by (A), (B) and (C). Any one or more or none of them
may be correct. Find out the correct starter(s), if any, and accordingly select
your answer from among the given five answer choices.
given. These two sentences are to be combined into a single sentence without
changing their meaning. Three probable starters of the so combined sentence are
given which are denoted by (A), (B) and (C). Any one or more or none of them
may be correct. Find out the correct starter(s), if any, and accordingly select
your answer from among the given five answer choices.
1. He has lost his immunity. Therefore, he is vulnerable to
any disease.
any disease.
(A) His loss of immunity….
(B) Because of his vulnerability to his…
(C) His vulnerability to any disease…
(a) Only (A)
(b) Only (B)
(c) Only (C)
(d) Only (A) and (C)
(e) Only (A) and (B)
2. You must sign your railway ticket, write your name and
age on it. It becomes valid only after that.
age on it. It becomes valid only after that.
(A) To make your railway ticket valid, the railway
authorities should sign…
authorities should sign…
(B) Without validating your railway ticket, you cannot…
(C) To validate your railway ticket, you must…
(a) Only (A)
(b) Only (B)
(c) Only (C)
(d) (A) and (B) only
(e) (B) and (C) only
3. Are you satisfied with this information? Please contact
me for any further clarification.
me for any further clarification.
(A) If you need… (B) In case you need…
(C) Should you need…
(a) None
(b) All the three
(c) (A) and (C) only
(d) (A) and (B) only
(e) (B) and (C) only
4. How much you earn is less important. What is more important
is how you earn, i.e., your methods of earning?
is how you earn, i.e., your methods of earning?
(A) How you earn is as important
(B) How much you earn is as important
(C) How you earn is not as important
(a) Only (A)
(b) Only (B)
(c) Only (C)
(d) All the three
(e) None of these
5. You must submit the proof of your being a US citizen.
Only then your NRI account will be made operative.
Only then your NRI account will be made operative.
(A) Unless you prove…
(B) Unless your NRI account is made operative…
(C) Without your NRI account, you must…
(a) Only (A)
(b) Only (B)
(c) Only (C)
(d) All the three
(e) None of these
Directions (Qs.6-10): Read the following passage carefully and
answer the questions given below it.
answer the questions given below it.
The evolution of Bring Your Own
Device (BYOD) trend has been as profound as it has been rapid. It represents
the more visible sign that the boundaries between personal life and work life
are blurring. The 9 am – 5 pm model of working solely from office has become
archaic and increasingly people are working extended hours from a range of
locations. At the vary heart of this evolution is the ability to access
enterprise networks from anywhere and anytime. The concept of cloud computing
serves effectively to extend the office out of office. The much heralded
benefit of BYOD is greater productivity. However, recent research has suggested
that this is the greatest myth of BYOD and the reality is that BYOD in practice
poses new challenges that may outweigh the benefits. A worldwide survey
commissioned by Fortinet chose to look at attitudes towards BYOD and security
from the users’s point of view instead of the IT managers. Specifically the
survey was conducted in 15 territories on a group of graduate employees in
their early twenties because they represent the first generation to enter the
workplace with an expectation of own devide use. Moreover, they also represent
tomorrow’s influences and decision makers. The survey findings reveal that for
financial organizations, the decision to embrace BYOD is extremely dangerous.
Larger organizations will have mature IT strategies and policies in place. But
what about smaller financial businesses? They might not have such well
developed strategies to protect confidential data. Crucially, within younger
employee group, 55% of the people share an expectation that they should be
allowed to use their own devices in the workplace or for work purposes. With
this expectation comes the very real risk that employees may consider
contravening company policy banning the use of own devices. The threats posed
by this level of subversion cannot be overstated. The survey casts doubt on the
idea of BYOD leading to greater productivity by revealing the real reason
people want to use their own devices. Only 26% of people in this age group cite
efficiency as the reason they want to use their own devices, while 63% admit that
the main reason is so they have access to their favourite applications. But
with personal applications so close to hand, the risks to the business must
surely include distraction and time wasting. To support this assumption 46% of
people polled acknowledged time wasting as the greatest threat to the
organization, while 42% citing greater exposure to theft or loss of
confidential data. Clearly, from a user perspective there is great deal of contradiction
surrounding BYOD and there exists an undercurrent of selfishness where users
except to use their own devices, but mostly for personal interest. They
recognize the risks to the organization but are adamant that those risks are
worth taking.
Device (BYOD) trend has been as profound as it has been rapid. It represents
the more visible sign that the boundaries between personal life and work life
are blurring. The 9 am – 5 pm model of working solely from office has become
archaic and increasingly people are working extended hours from a range of
locations. At the vary heart of this evolution is the ability to access
enterprise networks from anywhere and anytime. The concept of cloud computing
serves effectively to extend the office out of office. The much heralded
benefit of BYOD is greater productivity. However, recent research has suggested
that this is the greatest myth of BYOD and the reality is that BYOD in practice
poses new challenges that may outweigh the benefits. A worldwide survey
commissioned by Fortinet chose to look at attitudes towards BYOD and security
from the users’s point of view instead of the IT managers. Specifically the
survey was conducted in 15 territories on a group of graduate employees in
their early twenties because they represent the first generation to enter the
workplace with an expectation of own devide use. Moreover, they also represent
tomorrow’s influences and decision makers. The survey findings reveal that for
financial organizations, the decision to embrace BYOD is extremely dangerous.
Larger organizations will have mature IT strategies and policies in place. But
what about smaller financial businesses? They might not have such well
developed strategies to protect confidential data. Crucially, within younger
employee group, 55% of the people share an expectation that they should be
allowed to use their own devices in the workplace or for work purposes. With
this expectation comes the very real risk that employees may consider
contravening company policy banning the use of own devices. The threats posed
by this level of subversion cannot be overstated. The survey casts doubt on the
idea of BYOD leading to greater productivity by revealing the real reason
people want to use their own devices. Only 26% of people in this age group cite
efficiency as the reason they want to use their own devices, while 63% admit that
the main reason is so they have access to their favourite applications. But
with personal applications so close to hand, the risks to the business must
surely include distraction and time wasting. To support this assumption 46% of
people polled acknowledged time wasting as the greatest threat to the
organization, while 42% citing greater exposure to theft or loss of
confidential data. Clearly, from a user perspective there is great deal of contradiction
surrounding BYOD and there exists an undercurrent of selfishness where users
except to use their own devices, but mostly for personal interest. They
recognize the risks to the organization but are adamant that those risks are
worth taking.
6. According to the passage, for which of the following
reasons did Fortinet conduct the survey on a group of graduate employees in
their early twenties?
reasons did Fortinet conduct the survey on a group of graduate employees in
their early twenties?
(A) As this group represents the future decision makers
(B) As this group represents the first generation who entered
the workforce with a better understanding of sophisticated gadgets
the workforce with a better understanding of sophisticated gadgets
(C) As this group represents the first generation to enter the
workplace expecting that they can use their own devices for work purpose
workplace expecting that they can use their own devices for work purpose
(a) All (A), (B) and (C)
(b) Only (C)
(c) Both (A) and (C)
(d) Only (A)
(e) Only (B)
7. Which of the following is not true about BYOD?
(a) BYOD enables employees to access enterprise network from
anywhere and anytime
anywhere and anytime
(b) Due to evolution of BYOD trend the 9am – 5pm model of
working solely from office has become outdated
working solely from office has become outdated
(c) Recent research has confirmed that BYOD boosts organisational
productivity
productivity
(d) The concept of cloud computing facilitates the BYOD trend
8. According to the passage, why would the decision to embrace
BYOD prove dangerous to smaller financial businesses?
BYOD prove dangerous to smaller financial businesses?
(a) Their employees have poor knowledge about their devices
which in turn pose a threat to the confidential data of the organisation
which in turn pose a threat to the confidential data of the organisation
(b) Their employees are more vulnerable to misplacement of
devices
devices
(c) They may lack mature IT strategies and policies required
to protect confidential data
to protect confidential data
(d) They cannot afford to deal with damage liability issues of
employee-owned devices
employee-owned devices
(e) Their employees have a tendency to change jobs frequently
9. According to the passage, the expectation of younger employees
that they should be allowed to use their own devices in the workplace, entails
which of the following risks?
that they should be allowed to use their own devices in the workplace, entails
which of the following risks?
(A) Younger employees may deliberately transfer confidential
data of their companies to rivals if they are not allowed to use their own
devices for work purpose
data of their companies to rivals if they are not allowed to use their own
devices for work purpose
(B) Younger employees may strongly feel like leaving the company
if it presents usage of own device and join some other company that does not
have such stringent policies
if it presents usage of own device and join some other company that does not
have such stringent policies
(C) Younger employees may consider flouting company policy
prohibiting usage of their own devices in the workplace or for work purposes
prohibiting usage of their own devices in the workplace or for work purposes
(a) Only (C)
(b) Only (B)
(c) Both (A) and (C)
(d) Only (A)
(e) All (A), (B) and (C)
10. According to the findings of the survey conducted by Fortinet,
why do majority of employees prefer using their own devices for work purpose?
why do majority of employees prefer using their own devices for work purpose?
(a) As they often find that the devices provided by the company
lack quality
lack quality
(b) As they have access to their favourite applications while
working
working
(c) As majority of them believe that output doubles when they
use their own devices for work purpose
use their own devices for work purpose
(d) As handling data from their own devices reinforces their
sense of responsibility
sense of responsibility
Answers:
1. (e)
2. (d)
3. (b)
4. (a)
5. (c)
6. (c) as per paragraph 1 A and C are correct, hence correct answer is (c)
7. (c) paragraph 1 says (in line 13-14) that it is a myth… hence answer is (c)
8. (c) paragraph 1 – last few lines
9. (a) paragraph 2 , the 4th and 5th line explains this point.
10. (b)
ep
Recommended Test Series
Sponsored
(adsbygoogle = window.adsbygoogle || []).push({});
Regards
Team ExamPundit